1.
A broker has been created using default parameters. The broker is configured to allow the WebSphere Application Server to be the JMS provider. When creating a JMS provider configurable service for the WebSphere_WAS_Client, the administrator issues the following command: mqsichangeproperties MB7BROKER -c JMSProviders -o WebSphere_WAS_Client By default, where MUST the provider's JAR files be located on an AIX Message Broker system?
2.
A company needs to charge the customer based on the usage of its particular message flow on a broker. How can the administrator implement this?
3.
A BAR file which contains a message flow with SOAP nodes is provided by the development team for deployment. Before deploying the BAR file, the administrator needs to verify whether or not the port number is defined correctly. What should the administrator do to verify what ports have been allocated to the SOAP nodes?
4.
A developer is designing a message flow and has decided to use a secure SSL connection to a WebSphere Service Registry and Repository. The administrator must configure the broker to use a keystore for the HTTPS connection. Which type of keystore is supported?
5.
An administrator needs to set up a separate authorized login ID that the broker MB7BROKER can use to search the LDAP directory. Which command should the administrator issue to store the username and password?
6.
An administrator needs to configure several broker instances on distributed platforms to use broker security. The brokers operation is dependant on the information which is provided in the broker registry which in all cases must be secured and guarded against accidental corruption or failure. Select where the broker user registry is identified?
7.
An administrator has been asked to enable broker administration security in a UNIX environment and restrict deployment activities to users belonging to only a specific group. Which of the following commands does the administrator need to use to achieve this?
8.
An administrator needs to create a security mapping that uses a WS-Trust V1.3 compliant Security Token Server (STS) using Tivoli Federated Identity Manager (TFIM) V6.2. For the TFIM V6.2 WS-Trust V1.3 endpoint, the path is /TrustServerWST13/services/RequestSecurityToken Which command should the administrator issue?
9.
An administrator has activated the broker administration security for broker BRK running under queue manager BRKQMGR on a Windows system. The administrator has been asked to grant view and deployment permissions for user User1 only to execution group EG1. Which of the following set of commands does the administrator need to run?
10.
The broker environment in a company is as follows: The administrator has set up Public Key Infrastructure (PKI) at the broker level. For the flows that contained SOAP Input nodes, the administrator has set up PKI at the execution group level. The administrator also configured the broker-wide listener for the HTTP node based web services. In this environment, the administrator was asked to deploy a new secured web service based on HTTP nodes in the same execution group that contained SOAP node based web service. After a few days the partner system that was making HTTP(s) calls to this new web service reported SSL certificate expiry errors. What should the administrator do to resolve this problem?